Dark Web

Managing Dark Web Search Findings

Bolster’s Dark Web module monitors anonymous sources like Tor, I2P, and Telegram to surface exposed credentials, stolen data, and other threats based on your specific search terms.

These findings help your security team take timely, focused action on the threats that matter most.

To stay ahead of credential leaks, brand abuse, and threat actors operating in anonymous channels, follow this basic workflow:

  1. Review new threats as they appear.
  2. Route them to the right people, manually or via playbooks.
  3. Mark each one as mitigated or ignored based on your response.

Full Workflow

The module’s lists of Active, Mitigated, and Ignored Findings help you track this process and understand where each item is in your workflow. The list of Threat Actors helps you understand who is targeting your organization or brand.

Meanwhile, get a snapshot of real-time activity anytime on the Dark Web Dashboard.

Here’s what happens, starting with Bolster detecting a threat based on the search terms you have set up:

  1. Bolster discovers a new threat and adds it to the Active Findings list by default.
  2. Automated workflows alert people in your organization.
  3. Your team reviews the new threat and optionally adds tags to keep things organized.
  4. You either mitigate the threat or decide not to take action.
  5. You manually mark it as Mitigated or Ignored.

This setup supports ongoing triage and helps your team stay organized as threats evolve.  Your team gets a clear view of what still needs attention, what’s been addressed, and what’s no longer relevant.

Findings Lists

Here are the highlights of the findings lists:

  • Each finding is automatically added a list: Active Findings, Mitigated Findings, or Ignored Findings, depending on its Status value.
  • Access these lists from the navigation on the left side of the Dark Web module. Use the toggle in upper right to open or close the navigation bar.

  • The summary boxes at the top show key metrics, broken down by entity (information type). Select a box to go to that entity’s findings.
  • Adjust which columns appear using the checkbox menu, open by default on the right. The sideways Columns label operates as a toggle to open or close the menu.

  • Search, filter (and save filters), perform bulk actions, and export findings to CSV from this screen.
  • Select the info icon next to a Data Leak Source to see where the finding came from.
  • Directly update the status of a finding by selecting a status value. A menu will open where you can choose a new status for that finding.

Findings Lists Breakdown

The lists are organized in the same way. The difference is what findings they contain and what steps you can take from this screen.

List Contents Inclusion Criteria Available Actions
Active Findings Potential threats that require review or action A new finding is detected based on your search terms with status automatically set to Active
  • Open and review details
  • Tag findings to group or label them
  • Change status to Mitigated or Ignored
  • Export data for analysis or integration
Mitigated Findings Findings your team has acted on and marked as addressed Someone selects Mitigated as the new status
  • Open and review past mitigations
  • Change status to Active or Ignored
  • Export data for analysis or integration
Ignored Findings Findings deemed out of scope or not relevant to your organization or threat workflow Someone selects Ignored as the new status
  • Revisit low-priority or false positive findings
  • Change status to Active or Mitigated
  • Export data for analysis or integration

Threat Actors

A fourth list, Threat Actors, is also accessible from the left-side navigation. It focuses findings on the people posting potential threats on the dark web.

Use this screen to:

  • See which threat actors have been active recently.
  • See the type and threat level of each one’s work.